Corporate Partners

Top IT Security Bloggers

  • Facebook translates its privacy policy into plain English

    Sophos - Naked Security
    Facebook updated its privacy policy on Thursday, this time with an eye toward crystal-clear explanations in big fonts, bright colors and nice, short words.
  • Stratfor hacker Jeremy Hammond used his cat's name as a password

    Sophos - Naked Security
    Convicted Stratfor attacker, Jeremy Hammond, has revealed how he thinks the Feds managed to get together the evidence they needed to send him to prison. How? It's all down to his pet-related password.
  • Two-factor authentication: Understanding the options

    Sophos - Naked Security
    Which is better, "two-factor authentication" or "two-step verification"?

    Should you choose a token, SMSes or an app?

    John Shier helps you understand the various sorts of 2FA...
  • Tracking Activity in the Chinese Mobile Underground

    Trend Micro - Security Intelligence
    We first lifted the veil on activities in the Chinese cybercriminal underground in 2012. Since then, we have continually reported about notable changes or activity found in this black market. A few months ago, we noted that the Chinese underground has continued to grow, as the cost of connectivity and hardware continues to fall, and […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroTracking Activity in the Chinese Mobile Underground
  • Tracking Activity in the Chinese Mobile Underground

    TrendLabs - Malware Blog
    We first lifted the veil on activities in the Chinese cybercriminal underground in 2012. Since then, we have continually reported about notable changes or activity found in this black market. A few months ago, we noted that the Chinese underground has continued to grow, as the cost of connectivity and hardware continues to fall, and […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroTracking Activity in the Chinese Mobile Underground
  • Annual G20 summit is attractive target for Flea attack group

    Symantec Security Response Blogs
    Attackers attempt to steal information from targeted officials through spear-phishing emails.



    Each year, as world leaders come together to discuss a variety of global economic issues at the G20 summit, organizations with a vested interest in the event are the recipients of malicious emails from threat actors.
    read more
  • BASHLITE Affects Devices Running on BusyBox

    Trend Micro - Security Intelligence
    When news of the Shellshock vulnerability broke out at the end of September, we spotted several attacks that leveraged the said vulnerability, thus manifesting the prevalence or even evolution on how attackers used the exploit. For instance, attackers used Shellshock to target SMTP servers, launch botnet attacks, and even to download KAITEN source code among others. We […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroBASHLITE Affects Devices Running on BusyBox
  • BASHLITE Affects Devices Running on BusyBox

    TrendLabs - Malware Blog
    When news of the Shellshock vulnerability broke out at the end of September, we spotted several attacks that leveraged the said vulnerability, thus manifesting the prevalence or even evolution on how attackers used the exploit. For instance, attackers used Shellshock to target SMTP servers, launch botnet attacks, and even to download KAITEN source code among others. We […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroBASHLITE Affects Devices Running on BusyBox
  • Schannel vulnerability? IT/Security Must Watch Many Channels

    Trend Micro - Cloud Security Blog
    Cable and Satellite TV have produced an influx of both wonderful content as well as garbage programming for us to try and sift through as consumers. As we can all attest, finding content that is important and meaningful to us can be a challenge. You rely on other’s opinions in addition to your own research...
  • Build With Confidence

    Trend Micro - Cloud Security Blog
    Build with confidence from marknca on Vimeo. As an app developer, you know that security is important, but sometimes you can lose perspective as to why it’s important. Your users trust that when they share their data with your app, it will be safe. That trust is critical to your success and to your users’...

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place